Could a Keylogger Be Spying on You?
Techquickie
·Techquickie
·2019-05-06
·
841 words · ~4 min read
0:00
Thanks for watching Techquickie.
0:01
Click the subscribe button,
0:02
then enable notifications with the bell icon
0:04
so you won't miss any future videos.
0:07
All right, so you're a privacy conscious individual.
0:10
You've got two factor on all your accounts.
0:12
You use a reputable VPN service,
0:14
and you even watched our earlier episode on
0:16
what your ISP knows about you.
0:20
But what if there was something lurking
0:22
on your computer itself that could spill
0:25
all of your secrets in spite of your precautions?
0:31
I'm talking, of course, about a keystroke logger
0:34
or keylogger, a nefarious type of program
0:37
that does exactly what it sounds like.
0:39
It logs every button you press on your keyboard.
0:44
And while sometimes these can be used
0:46
for legitimate purposes like parental monitoring
0:49
or language research, they also make it child's play
0:53
to steal passwords and search history
0:56
or even spy on emails to your significant other.
1:00
Yikes.
1:00
And because a keystroke logger
1:01
or keylogger's principle of operation is so simple,
1:04
they're easy to code, easy to deploy
1:07
in a wide variety of situations, and easy to hide.
1:11
Once you get infected,
1:13
often by clicking on a compromised link,
1:15
software keyloggers can live just about anywhere,
1:18
operating inside a script on the webpage itself,
1:21
injecting themselves into the memory space
1:23
used by your programs to make them hard to detect,
1:26
or even getting into the code
1:28
of your operating system itself as a root kit
1:31
or by posing as a keyboard driver.
1:34
By the way, root kits are nefarious little bastards.
1:37
You can learn more about those up here.
1:39
Making matters worse, unless you can see the keylogger
1:42
in the background or in your notification tray,
1:45
or you're like noticing obvious delays in the keystrokes
1:49
that aren't explained by anything else,
1:51
it is really difficult to know if you have one installed.
1:54
Defeating them can sometimes even require
1:56
specialized anti-malware software that is designed to protect
2:01
against logging software.
2:03
So you might want to consider that if you're really concerned
2:05
that someone might be spying on you.
2:07
And while you're at it,
2:09
you might want to check the back of your PC too.
2:12
Fortunately, these are usually pretty easy to spot,
2:15
but hardware keyloggers also exist,
2:18
often as a dongle that sits between your keyboard cable
2:22
and the USB port on your computer.
2:24
These can be especially troublesome in settings
2:27
where people might not be able to see the back of the PC,
2:31
like in a library or an office.
2:34
And depending on how valuable your work is,
2:37
even that might not be enough.
2:39
There have been cases of hardware keyloggers
2:42
being embedded inside a keyboard by a determined snoop,
2:47
and then either retrieved wirelessly using a transmitter
2:50
or physically by going back and digging it back out later.
2:54
It's also even possible for keyloggers to sniff
2:58
the sometimes unencrypted connection
3:01
between a wireless keyboard and the PC
3:04
to snatch keystrokes out of the air.
3:07
And we're not done yet.
3:09
Now this is some real James Bond level stuff right here.
3:12
It's also possible to record the sounds that you make
3:17
as you press each key,
3:18
and use the fact that each key will sound slightly different
3:22
based on its position to reconstruct what you typed.
3:27
Then if that's not crazy enough,
3:29
security researchers have found
3:31
that keyboards give off different frequencies
3:33
of radio waves when different keys are pressed,
3:36
and can even trigger smartphone accelerometers
3:40
strongly enough to discern different keystrokes
3:43
if it's sitting close enough to your keyboard.
3:48
So I think all of this is enough
3:49
to make pretty much anyone paranoid,
3:51
but I do have some good news.
3:53
Unless some spy agency is after you,
3:56
your best bet is to just take a quick glance
3:58
at your cable every now and then
4:00
if you're using a PC in a shared environment,
4:02
run good anti-malware software,
4:05
and as always, stay away from shady links.
4:12
PIA VPN supports multiple protocols and encryption levels,
4:16
which allows you to dial in the exact level of protection
4:19
that you need.
4:20
You can run it on up to five devices at once,
4:23
and they've got apps for Windows, Mac, Android, iOS, Linux,
4:27
and even a Chrome extension with support for more platforms,
4:31
and they're coming soon.
4:32
They've got lots of great features,
4:34
so in addition to being able to bypass geo-restrictions
4:37
and censorship by making you appear
4:38
as though you're connecting from somewhere else,
4:40
you can also block unwanted connections to prevent attacks,
4:43
auto-block all traffic if the VPN disconnects,
4:46
and it even includes MACE, PIA's built-in malware blocker.
4:50
So what are you waiting for?
4:51
Check out PIA at the link in the video description.
4:55
So thanks for watching, guys.
4:55
Like, dislike, check out our other channels,
4:57
leave a comment, and don't forget to subscribe
4:59
so you don't miss any of our videos.
5:01
Not one of them, you should watch every single one.